Skip to main content

Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security

  • Conference paper
  • First Online:
Intelligent Cyber Physical Systems and Internet of Things (ICoICI 2022)

Abstract

Recognizing human activities plays a substantial role in human-to-human and human-to-computer interactions. Recognizing human activities from video sequences or pictures is a difficult task because of troubles, such as history clutter, partial occlusion, modifications in scale, viewpoint, lights and look. Human action is difficult to classify as a time series. Predicting a person’s movements is a part of this. In this paper, the KTH video dataset is used for designing the system. Feature extraction methods like optical flow and spatiotemporal techniques are being utilized to extract the features. Triple stacked autoencoders are used for clusterization to reduce the data dimensions. An efficient BoW vector feature extraction method is used for extracting text data, by which data is obtained for training the model. A deep learning algorithm such as VGG19 is used to determine and classify the activities of a human. The objective of this efficient model is to apply as an ATM surveillance as a camera module fixed in the room to perform constant surveillance. The Police department can have an mobile application through which they can monitor and desist any unwanted human activities happening in the ATM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang T, Ng WWY, Li J, Wu Q, Zhang S, Nugent C, Shewell C (2021) A deep clustering via automatic feature embedded learning for human activity recognition. J Latex Class Files. IEEE

    Google Scholar 

  2. Poh GS, Gope P, Ning J (2019) PrivHome: privacy-preserving authenticated communication in smart home environment. IEEE Trans Dependable Secure Comput 18(3):1095–1107

    Google Scholar 

  3. Ding C, Hong H, Zou Y, Chu H, Zhu X, Fioranelli F, Le Kernec J, Li C (2019) Continuous human motion recognition with a dynamic range-doppler trajectory method based on FMCW radar. IEEE Trans Geosci Remote Sens 57(9):6821–6831

    Article  Google Scholar 

  4. Taspinar S, Mohanty M, Memon N (2017) PRNU-based camera attribution from multiple seam-carved images. IEEE Trans Inf Forensics and Secur 12(12):3065–3080

    Article  Google Scholar 

  5. Lee YT, Hsiao WH, Huang CM, Seng-Cho TC (2016) An integrated cloud-based smart home management system with community hierarchy. IEEE Trans Consum Electron 62

    Google Scholar 

  6. Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process. Norwegian Biometric Laboratory, Gjøvik University College, Norway

    Google Scholar 

  7. Richard A, Gall J (2017) A bag-of-words equivalent recurrent neural network for action recognition. Comput Vis Image Underst 156:79–91

    Article  Google Scholar 

  8. Cozar JR, González-Linares JM, Guil N, Hernández R, Heredia Y (2012) Visual words selection for human action classification. In: 2012 International conference on high performance computing simulation (HPCS), pp 188–194

    Google Scholar 

  9. Law MT, Urtasun R, Zemel RS (2017) Deep spectral clustering learning. In: Proceedings of the 34th international conference on machine learning, vol 70, pp 1985–1994

    Google Scholar 

  10. Dizaji KG, Herandi A, Deng C, Cai W, Huang H (2017) Deep clustering via joint convolutional autoencoder embedding and relative entropy minimization. In: IEEE international conference on computer vision, pp 5747–5756

    Google Scholar 

  11. Shao L, Jones S, Li X (2014) Efficient search and localization of human actions in video databases. IEEE Trans Circuits Syst Video Technol 24(3):504–512

    Article  Google Scholar 

  12. Vivekanandam B (2020) Evaluation of activity monitoring algorithm based on smart approaches. J Electron 2(03):175–181

    Google Scholar 

  13. Bhambri P, Bagga S, Priya D, Singh H, Singh H, Dhiman HK (2020) Suspicious human activity detection system. J IoT Soc Mob Anal Cloud 2(4)

    Google Scholar 

  14. Herath S, Harandi M, Porikli F (2016) Going deeper into action recognition: survey. Image Vis Comput 60:4–21

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Srinivasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srinivasan, S., Vallikannu, A., Ganesh, A.S., Kumar, I.R., Gopal, B.V. (2023). Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security. In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds) Intelligent Cyber Physical Systems and Internet of Things. ICoICI 2022. Engineering Cyber-Physical Systems and Critical Infrastructures, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-031-18497-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18497-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18496-3

  • Online ISBN: 978-3-031-18497-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics